Category: Security/Firewalls

FBI Crackdown on Hackers Linked To International Blackshades Malware Ring 0

FBI Crackdown on Hackers Linked To International Blackshades Malware Ring

Representatives from the FBI (Federal Bureau of Investigations) New York Field Office and the U.S. Attorney’s Office for the Southern District of New York announced yesterday that they believe a Swedish national and an...

Allowing Consumers to Protect Their Privacy and Opting Out of Receiving Junkmail 0

Allowing Consumers to Protect Their Privacy and Opting Out of Receiving Junkmail

As a consumer, one of the most irritating things for a person is to sign up for a product or a service only to find out that their contact information has been sold, or...

British Researchers Create a Computer Virus That Spreads Through Wi-Fi Networks 0

British Researchers Create a Computer Virus That Spreads Through Wi-Fi Networks

British researchers have created a computer virus, called Chameleon, that they claim is the first virus that can spread just like a common cold virus that affects the humans. I saw this story published...

Managing Passwords for Service Accounts in SharePoint & SQL Server 2

Managing Passwords for Service Accounts in SharePoint & SQL Server

Managing service accounts on Windows servers have been a challenge for most organizations for quite some time. In recent years, Microsoft has made several enhancements to minimize the pain. In Windows Servers 2008 R2...

Hackers Steal Credit Card Data From 40 Million Target Customers 0

Hackers Steal Credit Card Data From 40 Million Target Customers

In one of the largest theft of credit and debit card data in U.S. history, 40 million customers that shopped at Target had their credit and debit card data stolen by hackers who broke...

Malware Targetting AutoCAD 0

Malware Targetting AutoCAD

Computer-Aided Design (CAD) programs have been around since 1980s. There primary purpose is to assist in the creation, modification, analysis, or optimization of a design. They are used in several different fields by engineers...

Gender Gap: Women Represent Only 11% of the Information-Security Workforce & 14% of Computer Science Graduates 0

Gender Gap: Women Represent Only 11% of the Information-Security Workforce & 14% of Computer Science Graduates

I read an interesting article today written by Michael Kassner for TechRepublic. In his article he explains why International Information Systems Security Certification Consortium (ISC)2 and the consulting firm of Frost & Sullivan believe they...

How Secure are Online Password Managers? 0

How Secure are Online Password Managers?

If you use an online password manager (LastPass, Agilebits, mSeven, etc.) to manage all your passwords, I am sure you’ve wondered how safe is the software. The password managers often offer you the convenience...

Hackers Reveal How to Hack into a Car & Do Nasty Things 0

Hackers Reveal How to Hack into a Car & Do Nasty Things

I just blogged about how hackers have revealed one can hack into an iPhone or an iPad in less than 60 seconds. Now here is another type of hacking that you should be thinking...

How to Hack iPhones and iPads in Less Than 60 Seconds 0

How to Hack iPhones and iPads in Less Than 60 Seconds

At the Black Hat USA 2013 conference, three Georgia Tech hackers showed everyone how to hack iPhones and iPads with malware imitating ordinary apps in less than 60 seconds using a “malicious charger.” Here...

Use AVG AntiVirus App to Locate, Lock, Unlock, or Wipe Your Android Device Remotely 49

Use AVG AntiVirus App to Locate, Lock, Unlock, or Wipe Your Android Device Remotely

AVG AntiVirus is a free and popular antivirus application that people have been using on their desktop computers for years to protect their desktop operating system, such as Windows XP or Windows 7. Download...

How to Disable Java in All Your Browsers 0

How to Disable Java in All Your Browsers

By now you may have heard of all the warnings and bad things that can happen if you have Java installed on your computer, like having your credit card or other personal data stolen,...